Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-27515 |
9.3 (4.0)
9.1 (3.1)
|
Binardat 10G08-0800GSM Network Switch Predictable Sess… |
Binardat Ltd. |
10G08-0800GSM Network Switch |
2026-02-24T15:04:41.427Z | 2026-02-24T15:04:41.427Z |
| CVE-2026-27507 |
9.3 (4.0)
9.8 (3.1)
|
Binardat 10G08-0800GSM Network Switch Hard-coded Credentials |
Binardat Ltd. |
10G08-0800GSM Network Switch |
2026-02-24T15:04:16.616Z | 2026-02-24T15:04:16.616Z |
| CVE-2026-23678 |
8.7 (4.0)
8.8 (3.1)
|
Binardat 10G08-0800GSM Network Switch Traceroute CLI C… |
Binardat Ltd. |
10G08-0800GSM Network Switch |
2026-02-24T15:03:35.734Z | 2026-02-24T15:03:49.724Z |
| CVE-2026-27584 |
9.2 (4.0)
|
ActualBudget server is Missing Authentication for Simp… |
actualbudget |
actual |
2026-02-24T14:59:21.175Z | 2026-02-24T14:59:21.175Z |
| CVE-2026-0402 |
4.9 (3.1)
|
A post-authentication Out-of-bounds Read vulnerab… |
SonicWall |
SonicOS |
2026-02-24T14:58:37.608Z | 2026-02-24T15:33:50.674Z |
| CVE-2026-27732 |
8.6 (4.0)
|
AVideo has Authenticated Server-Side Request Forgery v… |
WWBN |
AVideo |
2026-02-24T14:56:55.372Z | 2026-02-24T14:56:55.372Z |
| CVE-2026-0401 |
4.9 (3.1)
|
A post-authentication NULL Pointer Dereference vu… |
SonicWall |
SonicOS |
2026-02-24T14:55:57.545Z | 2026-02-24T15:34:30.604Z |
| CVE-2026-0400 |
4.9 (3.1)
|
A post-authentication Format String vulnerability… |
SonicWall |
SonicOS |
2026-02-24T14:54:15.394Z | 2026-02-24T15:35:10.650Z |
| CVE-2026-27568 |
5.1 (4.0)
|
AVideo has Stored Cross-Site Scripting via Markdown Co… |
WWBN |
AVideo |
2026-02-24T14:53:20.826Z | 2026-02-24T14:53:20.826Z |
| CVE-2026-0399 |
4.9 (3.1)
|
Multiple post-authentication stack-based buffer o… |
SonicWall |
SonicOS |
2026-02-24T14:52:10.841Z | 2026-02-24T15:50:29.865Z |
| CVE-2026-3102 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
exiftool PNG File MacOS.pm SetMacOSTags os command injection |
n/a |
exiftool |
2026-02-24T14:32:13.272Z | 2026-02-24T14:32:13.272Z |
| CVE-2026-3101 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Intelbras TIP 635G Ping os command injection |
Intelbras |
TIP 635G |
2026-02-24T14:32:08.166Z | 2026-02-24T14:32:08.166Z |
| CVE-2026-27567 |
6.5 (3.1)
|
Payload has Server-Side Request Forgery (SSRF) in Exte… |
payloadcms |
payload |
2026-02-24T14:22:37.803Z | 2026-02-24T14:22:37.803Z |
| CVE-2025-10010 |
6.8 (3.1)
|
Integrity Validation Bypass in CryptoPro Secure Disk f… |
CPSD IT SERVICES GMBH |
CryptoPro Secure Disk for BitLocker |
2026-02-24T14:13:29.155Z | 2026-02-24T14:53:28.726Z |
| CVE-2026-27483 |
8.8 (3.1)
|
MindsDB has Path Traversal in /api/files Leading to Re… |
mindsdb |
mindsdb |
2026-02-24T14:00:05.402Z | 2026-02-24T14:00:05.402Z |
| CVE-2026-27208 |
9.2 (3.1)
|
api-gateway-deploy Affected by Exploitable Command Inj… |
bleon-ethical |
api-gateway-deploy |
2026-02-24T13:52:43.155Z | 2026-02-24T13:52:43.155Z |
| CVE-2026-2807 |
N/A
|
Memory safety bugs fixed in Firefox 148 and Thunderbird 148 |
Mozilla |
Firefox |
2026-02-24T13:33:34.035Z | 2026-02-24T17:30:46.576Z |
| CVE-2026-2806 |
N/A
|
Uninitialized memory in the Graphics: Text component |
Mozilla |
Firefox |
2026-02-24T13:33:33.407Z | 2026-02-24T17:30:46.157Z |
| CVE-2026-2805 |
N/A
|
Invalid pointer in the DOM: Core & HTML component |
Mozilla |
Firefox |
2026-02-24T13:33:32.768Z | 2026-02-24T17:30:45.766Z |
| CVE-2026-2804 |
5.4 (3.1)
|
Use-after-free in the JavaScript: WebAssembly component |
Mozilla |
Firefox |
2026-02-24T13:33:32.144Z | 2026-02-24T17:30:44.942Z |
| CVE-2026-2803 |
N/A
|
Information disclosure, mitigation bypass in the Setti… |
Mozilla |
Firefox |
2026-02-24T13:33:31.491Z | 2026-02-24T17:30:44.561Z |
| CVE-2026-2802 |
4.2 (3.1)
|
Race condition in the JavaScript: GC component |
Mozilla |
Firefox |
2026-02-24T13:33:30.784Z | 2026-02-24T17:30:44.158Z |
| CVE-2026-2801 |
N/A
|
Incorrect boundary conditions in the JavaScript: WebAs… |
Mozilla |
Firefox |
2026-02-24T13:33:29.929Z | 2026-02-24T17:30:43.776Z |
| CVE-2026-2800 |
N/A
|
Spoofing issue in the WebAuthn component in Firefox fo… |
Mozilla |
Firefox |
2026-02-24T13:33:29.312Z | 2026-02-24T17:30:43.309Z |
| CVE-2026-2799 |
N/A
|
Use-after-free in the DOM: Core & HTML component |
Mozilla |
Firefox |
2026-02-24T13:33:28.665Z | 2026-02-24T17:30:42.844Z |
| CVE-2026-2798 |
8.8 (3.1)
|
Use-after-free in the DOM: Core & HTML component |
Mozilla |
Firefox |
2026-02-24T13:33:28.034Z | 2026-02-24T18:25:31.688Z |
| CVE-2026-2797 |
N/A
|
Use-after-free in the JavaScript: GC component |
Mozilla |
Firefox |
2026-02-24T13:33:27.406Z | 2026-02-24T17:30:42.064Z |
| CVE-2026-2796 |
N/A
|
JIT miscompilation in the JavaScript: WebAssembly component |
Mozilla |
Firefox |
2026-02-24T13:33:26.775Z | 2026-02-24T17:30:41.643Z |
| CVE-2026-2795 |
N/A
|
Use-after-free in the JavaScript: GC component |
Mozilla |
Firefox |
2026-02-24T13:33:26.111Z | 2026-02-24T17:30:41.221Z |
| CVE-2026-2794 |
N/A
|
Information disclosure due to uninitialized memory in … |
Mozilla |
Firefox |
2026-02-24T13:33:25.399Z | 2026-02-24T13:33:25.399Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-v264-xqh4-9xmm |
9.9 (3.1)
|
OneUptime:: node:vm sandbox escape in probe allows any project member to achieve RCE | 2026-02-24T16:00:56Z | 2026-02-24T16:00:56Z |
| ghsa-v2gc-rm6g-wrw9 |
5.5 (4.0)
|
Craft CMS: Cloud Metadata SSRF Protection Bypass via IPv6 Resolution | 2026-02-24T15:51:07Z | 2026-02-24T15:51:07Z |
| ghsa-w8mw-frc6-r7m8 |
5.3 (3.1)
|
ImageMagick: Invalid MSL <map> can result in a use after free | 2026-02-24T15:46:49Z | 2026-02-24T15:46:49Z |
| ghsa-gwr3-x37h-h84v |
6.2 (3.1)
|
ImageMagick has a possible infinite loop in its JPEG encoder when using `jpeg:extent` | 2026-02-24T15:46:25Z | 2026-02-24T15:46:25Z |
| ghsa-v994-63cg-9wj3 |
6.2 (3.1)
|
ImageMagick has infinite loop when writing IPTCTEXT leads to denial of service via crafted profile | 2026-02-24T15:46:03Z | 2026-02-24T15:46:03Z |
| ghsa-7355-pwx2-pm84 |
7.5 (3.1)
|
ImageMagick: Integer overflow or wraparound and incorrect conversion between numeric types in the i… | 2026-02-24T15:45:35Z | 2026-02-24T15:45:35Z |
| ghsa-782x-jh29-9mf7 |
5.3 (3.1)
|
ImageMagick: MSL image stack index may fail to refresh, leading to leaked images | 2026-02-24T15:45:13Z | 2026-02-24T15:45:13Z |
| ghsa-42p5-62qq-mmh7 |
5.3 (3.1)
|
ImageMagick has a heap buffer over-read in its MAP image decoder | 2026-02-24T15:44:47Z | 2026-02-24T15:44:47Z |
| ghsa-v7g2-m8c5-mf84 |
7.5 (3.1)
|
ImageMagick: Memory allocation with excessive without limits in the internal SVG decoder | 2026-02-24T15:44:19Z | 2026-02-24T15:44:19Z |
| ghsa-fwqw-2x5x-w566 |
5.3 (3.1)
|
ImageMagick has Use After Free in MSLStartElement in "coders/msl.c" | 2026-02-24T15:43:54Z | 2026-02-24T15:43:55Z |
| ghsa-xgm3-v4r9-wfgm |
5.3 (3.1)
|
Image Magick has a Memory Leak in coders/ashlar.c | 2026-02-24T15:43:28Z | 2026-02-24T15:43:28Z |
| ghsa-72hf-fj62-w6j4 |
7.4 (3.1)
|
ImageMagick: Stack buffer overflow in FTXT reader via oversized integer field | 2026-02-24T15:43:02Z | 2026-02-24T15:43:02Z |
| ghsa-xwc6-v6g8-pw2h |
5.9 (3.1)
|
ImageMagick's Security Policy Bypass through config/policy-secure.xml via "fd handler" leads to std… | 2026-02-24T15:42:37Z | 2026-02-24T15:42:38Z |
| ghsa-8jvj-p28h-9gm7 |
8.6 (3.1)
|
ImageMagick: Policy bypass through path traversal allows reading restricted content despite secured… | 2026-02-24T15:40:06Z | 2026-02-24T15:40:06Z |
| ghsa-vpxv-r9pg-7gpr |
6.5 (3.1)
|
ImageMagick has Global Buffer Overflow (OOB Read) via Negative Pixel Index in UIL and XPM Writer | 2026-02-24T15:39:11Z | 2026-02-24T15:39:11Z |
| ghsa-6j5f-24fw-pqp4 |
6.5 (3.1)
|
ImageMagick: Heap overflow in sun decoder on 32-bit systems may result in out of bounds write | 2026-02-24T15:38:35Z | 2026-02-24T15:38:35Z |
| ghsa-543g-8grm-9cw6 |
5.3 (3.1)
|
ImageMagick has Division-by-Zero in YUV sampling factor validation, which leads to crash | 2026-02-24T15:37:53Z | 2026-02-24T15:37:53Z |
| ghsa-p863-5fgm-rgq4 |
5.3 (3.1)
|
ImageMagick has NULL Pointer Dereference in ClonePixelCacheRepository via crafted image | 2026-02-24T15:36:08Z | 2026-02-24T15:36:08Z |
| ghsa-rw6c-xp26-225v |
5.7 (3.1)
|
ImageMagick: Code Injection via PostScript header in ps coders | 2026-02-24T15:34:26Z | 2026-02-24T15:34:26Z |
| ghsa-g2pr-qxjg-7r2w |
5.3 (3.1)
|
ImageMagick has memory leak of watermark Image object in ReadSTEGANOImage on multiple error/early-r… | 2026-02-24T15:33:56Z | 2026-02-24T15:33:57Z |
| ghsa-p33r-fqw2-rqmm |
5.3 (3.1)
|
ImageMagick has NULL pointer dereference in ReadSFWImage after DestroyImageInfo (sfw.c) | 2026-02-24T15:32:34Z | 2026-02-24T15:32:34Z |
| ghsa-vhqj-f5cj-9x8h |
8.2 (3.1)
|
ImageMagick has heap-buffer-overflow via signed integer overflow in WriteUHDRImage when writing UHD… | 2026-02-24T15:31:57Z | 2026-02-24T15:31:57Z |
| ghsa-gxcx-qjqp-8vjw |
5.3 (3.1)
|
ImageMagick has memory leak in msl encoder | 2026-02-24T15:30:54Z | 2026-02-24T15:30:54Z |
| ghsa-xx53-6qqj-gr7w |
|
Memory safety bugs present in Firefox 147 and Thunderbird 147. Some of these bugs showed evidence o… | 2026-02-24T15:30:33Z | 2026-02-24T18:31:02Z |
| ghsa-xqx8-2c6c-9g3g |
4.9 (3.1)
|
A post-authentication NULL Pointer Dereference vulnerability in SonicOS allows a remote attacker to… | 2026-02-24T15:30:33Z | 2026-02-24T18:31:02Z |
| ghsa-v5qr-j3c6-xxx2 |
|
TOTOLINK X5000R V9.1.0cu.2415_B20250515 contains a denial-of-service vulnerability in /cgi-bin/cste… | 2026-02-24T15:30:33Z | 2026-02-24T15:30:33Z |
| ghsa-pr9m-7cjw-258w |
4.9 (3.1)
|
A post-authentication Out-of-bounds Read vulnerability in SonicOS allows a remote attacker to crash… | 2026-02-24T15:30:33Z | 2026-02-24T18:31:02Z |
| ghsa-pq5g-x5q3-3g25 |
4.9 (3.1)
|
Multiple post-authentication stack-based buffer overflow vulnerabilities in the SonicOS management … | 2026-02-24T15:30:33Z | 2026-02-24T18:31:02Z |
| ghsa-mr6q-w873-6jfr |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was determined in exiftool up to 13.49 on macOS. This issue affects the function Se… | 2026-02-24T15:30:33Z | 2026-02-24T15:30:33Z |
| ghsa-6pf6-w4c2-rx3f |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was found in Intelbras TIP 635G 1.12.3.5. This vulnerability affects unknown code o… | 2026-02-24T15:30:33Z | 2026-02-24T15:30:33Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2025-18 |
|
picklescan before 0.0.21 does not treat 'pip' as an unsafe global. An attacker could craf… | picklescan | 2025-02-26T15:15:24+00:00 | 2025-04-09T17:27:26.867210+00:00 |
| pysec-2025-31 |
|
vyper is a Pythonic Smart Contract Language for the EVM. Vyper handles AugAssign statemen… | vyper | 2025-02-21T22:15:13+00:00 | 2025-04-09T17:27:28.116292+00:00 |
| pysec-2025-30 |
|
vyper is a Pythonic Smart Contract Language for the EVM. Multiple evaluation of a single … | vyper | 2025-02-21T22:15:13+00:00 | 2025-04-09T17:27:28.064106+00:00 |
| pysec-2025-29 |
|
vyper is a Pythonic Smart Contract Language for the EVM. Vyper `sqrt()` builtin uses the … | vyper | 2025-02-21T22:15:13+00:00 | 2025-04-09T17:27:28.005382+00:00 |
| pysec-2025-62 |
|
vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Mal… | vllm | 2025-02-07T20:15:34+00:00 | 2025-07-01T23:22:49.083695+00:00 |
| pysec-2025-28 |
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2025-01-29T21:15:21+00:00 | 2025-04-09T17:27:27.772920+00:00 |
| pysec-2025-27 |
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2025-01-29T21:15:21+00:00 | 2025-04-09T17:27:27.711157+00:00 |
| pysec-2025-26 |
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2025-01-29T21:15:21+00:00 | 2025-04-09T17:27:27.645758+00:00 |
| pysec-2025-58 |
8.8 (3.1)
|
vLLM is a library for LLM inference and serving. vllm/model_executor/weight_utils.py impl… | vllm | 2025-01-27T18:15:41+00:00 | 2025-06-27T21:22:36.583615+00:00 |
| pysec-2025-2 |
|
uniapi version 1.0.7 introduces code that would execute on import of the module and downl… | uniapi | 2025-01-24T19:56:53+00:00 | |
| pysec-2025-12 |
|
CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang St… | codechecker | 2025-01-21T15:15:13+00:00 | 2025-04-08T10:23:23.899726+00:00 |
| pysec-2025-1 |
|
An issue was discovered in Django 5.1 before 5.1.5, 5.0 before 5.0.11, and 4.2 before 4.2… | django | 2025-01-14T19:15:32+00:00 | 2025-01-14T21:22:18.665005+00:00 |
| pysec-2025-33 |
7.5 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the EVM. When the Vyper Compiler uses the… | vyper | 2025-01-14T18:16:05+00:00 | 2025-04-23T21:23:01.322686+00:00 |
| pysec-2024-158 |
|
Versions of the package djoser before 2.3.0 are vulnerable to Authentication Bypass when … | djoser | 2024-12-13T05:15:07+00:00 | 2025-01-14T05:22:11.856636+00:00 |
| pysec-2024-154 |
8.6 (3.1)
8.7 (4.0)
|
Ultralytics has identified a supply chain attack affecting affecting multiple versions of… | ultralytics | 2024-12-10T19:20:27.097505+00:00 | |
| pysec-2024-159 |
|
Versions of the package luigi before 3.6.0 are vulnerable to Arbitrary File Write via Arc… | luigi | 2024-12-10T05:15:07+00:00 | 2025-01-14T05:22:17.204098+00:00 |
| pysec-2024-157 |
|
An issue was discovered in Django 5.1 before 5.1.4, 5.0 before 5.0.10, and 4.2 before 4.2… | django | 2024-12-06T12:15:18+00:00 | 2025-01-14T05:22:11.817473+00:00 |
| pysec-2024-156 |
|
An issue was discovered in Django 5.1 before 5.1.4, 5.0 before 5.0.10, and 4.2 before 4.2… | django | 2024-12-06T12:15:17+00:00 | 2025-01-14T05:22:11.736011+00:00 |
| pysec-2024-256 |
|
Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessm… | mobsf | 2024-12-03T16:15:24+00:00 | 2025-06-27T17:22:53.325430+00:00 |
| pysec-2024-161 |
|
Deserialization of untrusted data in IPC and Parquet readers in the Apache Arrow R packag… | pyarrow | 2024-11-28T17:15:48+00:00 | 2025-01-14T05:22:20.554292+00:00 |
| pysec-2024-152 |
|
aiocpa is a user-facing library for generating color gradients of text. Version 0.1.13 in… | aiocpa | 2024-11-25T19:30:00+00:00 | |
| pysec-2024-224 |
7.0 (3.1)
|
Excessive directory permissions in MLflow leads to local privilege escalation when using … | mlflow | 2024-11-25T14:15:06+00:00 | 2025-02-03T16:23:40.409646+00:00 |
| pysec-2024-187 |
9.8 (3.1)
|
virtualenv before 20.26.6 allows command injection through the activation scripts for a v… | virtualenv | 2024-11-24T16:15:06+00:00 | 2025-01-19T04:23:01.784352+00:00 |
| pysec-2024-229 |
8.8 (3.1)
|
Hugging Face Transformers Trax Model Deserialization of Untrusted Data Remote Code Execut… | transformers | 2024-11-22T22:15:07+00:00 | 2025-02-10T23:22:41.499413+00:00 |
| pysec-2024-228 |
8.8 (3.1)
|
Hugging Face Transformers MaskFormer Model Deserialization of Untrusted Data Remote Code … | transformers | 2024-11-22T22:15:07+00:00 | 2025-02-10T23:22:41.449105+00:00 |
| pysec-2024-227 |
8.8 (3.1)
|
Hugging Face Transformers MobileViTV2 Deserialization of Untrusted Data Remote Code Execu… | transformers | 2024-11-22T22:15:06+00:00 | 2025-02-10T23:22:41.399021+00:00 |
| pysec-2024-178 |
7.5 (3.1)
|
Litestar is an Asynchronous Server Gateway Interface (ASGI) framework. Prior to version 2… | litestar | 2024-11-20T21:15:08+00:00 | 2025-01-19T01:52:23.772726+00:00 |
| pysec-2024-160 |
6.1 (3.1)
|
lxml_html_clean is a project for HTML cleaning functionalities copied from `lxml.html.cle… | lxml-html-clean | 2024-11-19T22:15:21+00:00 | 2025-01-14T05:22:17.244267+00:00 |
| pysec-2024-124 |
4.8 (3.1)
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting… | django-cms | 2024-11-18T12:15:00Z | 2024-11-20T16:23:43.554559Z |
| pysec-2024-123 |
6.1 (3.1)
|
An open redirection vulnerability exists in pyload/pyload version 0.5.0. The vulnerabilit… | pyload-ng | 2024-11-15T11:15:00+00:00 | 2024-11-19T22:22:34.280606+00:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-974 | Malicious code in yarsg (npm) | 2026-02-20T16:59:54Z | 2026-02-23T04:21:37Z |
| mal-2026-973 | Malicious code in veim (npm) | 2026-02-20T16:59:54Z | 2026-02-23T04:21:36Z |
| mal-2026-958 | Malicious code in ethres (npm) | 2026-02-20T16:59:54Z | 2026-02-23T04:21:32Z |
| mal-2026-970 | Malicious code in secp256 (npm) | 2026-02-20T16:56:12Z | 2026-02-23T04:21:35Z |
| mal-2026-968 | Malicious code in rimarf (npm) | 2026-02-20T16:56:12Z | 2026-02-23T04:21:35Z |
| mal-2026-965 | Malicious code in node-native-bridge (npm) | 2026-02-20T16:56:12Z | 2026-02-23T04:21:34Z |
| mal-2026-960 | Malicious code in hardhta (npm) | 2026-02-20T16:56:12Z | 2026-02-23T04:21:33Z |
| mal-2026-959 | Malicious code in format-defaults (npm) | 2026-02-20T16:56:12Z | 2026-02-23T04:21:33Z |
| mal-2026-956 | Malicious code in crypto-reader-info (npm) | 2026-02-20T16:56:12Z | 2026-02-23T04:21:32Z |
| mal-2026-971 | Malicious code in suport-color (npm) | 2026-02-20T16:56:11Z | 2026-02-23T04:21:36Z |
| mal-2026-966 | Malicious code in opencraw (npm) | 2026-02-20T16:56:11Z | 2026-02-23T04:21:35Z |
| mal-2026-962 | Malicious code in iruchache (npm) | 2026-02-20T16:56:11Z | 2026-02-23T04:21:33Z |
| mal-2026-961 | Malicious code in iru-caches (npm) | 2026-02-20T16:56:11Z | 2026-02-23T04:21:33Z |
| mal-2026-954 | Malicious code in cloude-code (npm) | 2026-02-20T16:56:11Z | 2026-02-23T04:21:32Z |
| mal-2026-953 | Malicious code in cloude (npm) | 2026-02-20T16:56:11Z | 2026-02-23T04:21:32Z |
| mal-2026-952 | Malicious code in claud-code (npm) | 2026-02-20T16:56:11Z | 2026-02-23T04:21:32Z |
| mal-2026-996 | Malicious code in rubocop-vintedmetrics (RubyGems) | 2026-02-20T11:40:23Z | 2026-02-23T03:10:14Z |
| mal-2026-951 | Malicious code in printrables (PyPI) | 2026-02-20T06:59:50Z | 2026-02-20T06:59:50Z |
| mal-2026-947 | Malicious code in ethrpc (PyPI) | 2026-02-19T23:56:09Z | 2026-02-19T23:56:09Z |
| mal-2026-950 | Malicious code in web3tool (PyPI) | 2026-02-19T23:53:33Z | 2026-02-19T23:53:33Z |
| mal-2026-948 | Malicious code in ethrpc-accounts (PyPI) | 2026-02-19T23:44:13Z | 2026-02-19T23:44:13Z |
| mal-2026-949 | Malicious code in ethrpc-keys (PyPI) | 2026-02-19T23:39:31Z | 2026-02-20T00:22:44Z |
| mal-2026-939 | Malicious code in ably-forks (npm) | 2026-02-19T10:50:50Z | 2026-02-23T04:21:31Z |
| mal-2026-938 | Malicious code in pylibcugraphops (PyPI) | 2026-02-19T09:16:31Z | 2026-02-19T09:16:31Z |
| mal-2026-936 | Malicious code in questpro (PyPI) | 2026-02-18T19:43:37Z | 2026-02-18T19:43:37Z |
| mal-2026-937 | Malicious code in telebot-infee (PyPI) | 2026-02-18T19:32:14Z | 2026-02-18T19:32:14Z |
| mal-2026-945 | Malicious code in ui5-cap-event-app-server (npm) | 2026-02-18T19:20:54Z | 2026-02-23T04:21:36Z |
| mal-2026-934 | Malicious code in telebot-infoe (PyPI) | 2026-02-18T18:42:29Z | 2026-02-18T18:42:29Z |
| mal-2026-935 | Malicious code in telebot-infoo (PyPI) | 2026-02-18T18:36:00Z | 2026-02-18T18:36:00Z |
| mal-2026-940 | Malicious code in abcxyzz (npm) | 2026-02-18T09:35:39Z | 2026-02-23T04:21:31Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-django-2025-14550 | Potential denial-of-service vulnerability via repeated headers when using ASGI | 2026-02-05T08:38:18.195Z | 2026-02-05T09:10:30.960Z |
| bit-django-2025-13473 | Username enumeration through timing difference in mod_wsgi authentication handler | 2026-02-05T08:38:16.508Z | 2026-02-05T09:10:30.960Z |
| bit-python-2007-4559 | 2026-02-03T16:04:06.884Z | 2026-02-03T16:04:06.884Z | |
| bit-python-2026-1299 | email BytesGenerator header injection due to unquoted newlines | 2026-02-03T08:53:00.053Z | 2026-02-23T12:55:58.474Z |
| bit-libpython-2026-1299 | email BytesGenerator header injection due to unquoted newlines | 2026-02-03T08:45:06.015Z | 2026-02-23T12:55:58.474Z |
| bit-mastodon-2026-23963 | Mastodon missing length limits on list names, filter names, and filter keywords | 2026-02-03T08:44:38.949Z | 2026-02-03T09:12:55.720Z |
| bit-mastodon-2026-23962 | Mastodon vulnerable to Denial of Service from a single post (client/server) | 2026-02-03T08:44:37.076Z | 2026-02-03T09:12:55.720Z |
| bit-mastodon-2026-23961 | Mastodon may allow a remote suspension bypass | 2026-02-03T08:44:35.033Z | 2026-02-03T09:12:55.720Z |
| bit-kyverno-2026-23881 | Kyverno Denial of Service via Context Variable Amplification in Policy Engine | 2026-02-03T08:42:39.101Z | 2026-02-03T09:12:55.720Z |
| bit-kyverno-2026-22039 | Kyverno Cross-Namespace Privilege Escalation via Policy apiCall | 2026-02-03T08:42:37.380Z | 2026-02-03T09:12:55.720Z |
| bit-ghost-2026-24778 | Ghost vulnerable to XSS via malicious Portal preview links | 2026-02-03T08:40:51.583Z | 2026-02-03T09:12:55.720Z |
| bit-discourse-2026-24742 | Discourse staff action logs expose sensitive information to moderators | 2026-02-02T08:42:31.943Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2026-21865 | Discourse topic conversion permission vulnerability for moderators | 2026-02-02T08:42:28.354Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-69289 | Discourse has insecure default configuration that allows non-admin moderators to takeover any non-staff account via email change | 2026-02-02T08:42:26.675Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-69218 | Discourse moderators can access admin-only reports exposing private upload URLs | 2026-02-02T08:42:24.998Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-68934 | Discourse Has Denial of Service (DoS) Vulnerability in Drafts Creation Endpoint | 2026-02-02T08:42:23.259Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-68933 | Discourse non-admin moderators can exfiltrate private content via post ownership transfer | 2026-02-02T08:42:21.302Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-68666 | Discourse users archives leaked to users with moderation privileges | 2026-02-02T08:42:19.452Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-68662 | FinalDestination hostname matching allows SSRF protection bypass | 2026-02-02T08:42:17.844Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-68660 | Discourse AI Discover's continue conversation allows threat actor to impersonate user | 2026-02-02T08:42:16.289Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-68659 | Discourse has DoS vulnerability in username change endpoint | 2026-02-02T08:42:14.606Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-68479 | Discourse subscriptions are susceptible to takeover | 2026-02-02T08:42:12.613Z | 2026-02-02T09:12:04.887Z |
| bit-discourse-2025-67723 | Discourse vulnerable to stored Cross-site Scripting via Katex in discourse-math plugin | 2026-02-02T08:42:10.509Z | 2026-02-10T09:16:50.296Z |
| bit-discourse-2025-66488 | Discourse allows script execution in uploaded HTML/XML files on S3 | 2026-02-02T08:42:08.194Z | 2026-02-02T09:12:04.887Z |
| bit-golang-2025-68119 | Unexpected code execution when invoking toolchain in cmd/go | 2026-01-31T08:43:40.539Z | 2026-01-31T09:09:11.750Z |
| bit-golang-2025-61731 | Arbitrary file write using cgo pkg-config directive in cmd/go | 2026-01-31T08:43:38.643Z | 2026-01-31T09:09:11.750Z |
| bit-golang-2025-61730 | Handshake messages may be processed at the incorrect encryption level in crypto/tls | 2026-01-31T08:43:36.684Z | 2026-02-03T09:12:55.720Z |
| bit-joomla-2025-63083 | Joomla! Core - [20260102] - XSS vector in the pagebreak plugin | 2026-01-31T08:43:33.433Z | 2026-01-31T09:09:11.750Z |
| bit-golang-2025-61728 | Excessive CPU consumption when building archive index in archive/zip | 2026-01-31T08:43:32.870Z | 2026-01-31T09:09:11.750Z |
| bit-joomla-2025-63082 | Joomla! Core - [20260101] - Inadequate content filtering for data URLs | 2026-01-31T08:43:31.962Z | 2026-01-31T09:09:11.750Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-na36743 | Within HostnameError | 2026-01-30T16:35:55.379246Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ty78539 | ParseAddress function constructs domain-literal address components through repeated string concatenation | 2026-01-30T16:35:55.295657Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-gj12884 | Within HostnameError | 2026-01-30T16:31:25.827659Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-nl96892 | Within HostnameError | 2026-01-30T16:31:25.336110Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yk54840 | Within HostnameError | 2026-01-30T16:30:55.324232Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-dn37053 | Within HostnameError | 2026-01-30T16:30:25.711037Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-rt10702 | Within HostnameError | 2026-01-30T16:30:25.697056Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ib84500 | security issue was discovered in Kubernetes where a malicious or compromised pod could bypass network restrictions enforced by network policies during namespace deletion | 2026-01-30T16:29:55.343868Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-au31441 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:29:25.997506Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-wg18689 | attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests | 2026-01-30T16:29:25.690410Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-tf33105 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T16:29:25.639055Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-nv82543 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:29:25.549030Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ul17352 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:29:25.464127Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ma27248 | Cancelling a query (e | 2026-01-30T16:28:55.356497Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-kd20596 | Cancelling a query (e | 2026-01-30T16:28:55.316811Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-an66259 | attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests | 2026-01-30T16:28:25.281484Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ai42483 | PostgreSQL optimizer statistics allow a user to read sampled data within a view that the user cannot access | 2026-01-30T16:26:55.732852Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-gq48460 | Cancelling a query (e | 2026-01-30T16:26:55.253385Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-mb75553 | vulnerability was found in Avahi, where a reachable assertion exists in avahi_dns_packet_append_record | 2026-01-30T16:26:25.443727Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-fn12833 | Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security) | 2026-01-30T16:25:25.422564Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-sw55801 | Within HostnameError | 2026-01-30T16:24:55.642434Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ek72220 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:24:55.137022Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-qe58701 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:22:55.193625Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pt11267 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:22:25.604414Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-nr68832 | libexpat in Expat before 2 | 2026-01-30T16:22:25.447471Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xo49545 | Within HostnameError | 2026-01-30T16:21:25.500719Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ui65993 | Within HostnameError | 2026-01-30T16:21:25.457624Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ml51665 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:20:55.711028Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pk62208 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:20:55.127319Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ch38544 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:19:55.527550Z | 2026-01-29T18:58:54Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| drupal-contrib-2025-076 | 2025-05-28T17:46:09.000Z | 2025-05-29T18:15:56.000Z | |
| drupal-contrib-2025-075 | 2025-05-28T17:45:37.000Z | 2025-05-29T18:16:19.000Z | |
| drupal-contrib-2025-074 | 2025-05-28T17:44:33.000Z | 2025-05-29T18:16:36.000Z | |
| drupal-contrib-2025-073 | 2025-05-28T17:44:12.000Z | 2025-05-29T18:16:49.000Z | |
| drupal-contrib-2025-072 | 2025-05-28T17:43:44.000Z | 2025-05-29T18:16:59.000Z | |
| drupal-contrib-2025-071 | 2025-05-28T17:43:23.000Z | 2025-05-29T18:17:12.000Z | |
| drupal-contrib-2025-070 | 2025-05-28T17:41:20.000Z | 2025-05-29T18:17:25.000Z | |
| drupal-contrib-2025-069 | 2025-05-21T17:29:25.000Z | 2025-05-29T18:17:38.000Z | |
| drupal-contrib-2025-068 | 2025-05-21T17:29:14.000Z | 2025-05-21T17:29:14.000Z | |
| drupal-contrib-2025-067 | 2025-05-21T17:28:55.000Z | 2025-05-21T17:28:55.000Z | |
| drupal-contrib-2025-066 | 2025-05-21T17:28:47.000Z | 2025-05-21T17:28:47.000Z | |
| drupal-contrib-2025-065 | 2025-05-21T17:28:31.000Z | 2025-05-21T17:28:31.000Z | |
| drupal-contrib-2025-064 | 2025-05-21T17:28:11.000Z | 2025-05-21T17:28:11.000Z | |
| drupal-contrib-2025-063 | 2025-05-14T18:05:32.000Z | 2025-05-14T18:05:32.000Z | |
| drupal-contrib-2025-062 | 2025-05-14T18:05:22.000Z | 2025-05-14T18:05:22.000Z | |
| drupal-contrib-2025-061 | 2025-05-14T18:05:13.000Z | 2025-05-14T18:05:13.000Z | |
| drupal-contrib-2025-060 | 2025-05-14T18:05:04.000Z | 2025-05-14T18:05:04.000Z | |
| drupal-contrib-2025-059 | 2025-05-14T18:04:52.000Z | 2025-05-29T18:18:54.000Z | |
| drupal-contrib-2025-058 | 2025-05-14T18:04:44.000Z | 2025-05-29T18:19:12.000Z | |
| drupal-contrib-2025-057 | 2025-05-14T18:04:31.000Z | 2025-05-14T19:39:43.000Z | |
| drupal-contrib-2025-056 | 2025-05-07T17:08:31.000Z | 2025-05-07T17:16:40.000Z | |
| drupal-contrib-2025-055 | 2025-05-07T17:07:46.000Z | 2025-05-07T17:16:36.000Z | |
| drupal-contrib-2025-054 | 2025-05-07T17:07:32.000Z | 2025-05-07T17:16:32.000Z | |
| drupal-contrib-2025-053 | 2025-05-07T17:07:22.000Z | 2025-05-07T17:16:27.000Z | |
| drupal-contrib-2025-052 | 2025-05-07T17:07:14.000Z | 2025-05-07T17:16:21.000Z | |
| drupal-contrib-2025-051 | 2025-05-07T17:07:03.000Z | 2025-05-29T18:19:36.000Z | |
| drupal-contrib-2025-050 | 2025-05-07T17:06:52.000Z | 2025-05-29T18:19:50.000Z | |
| drupal-contrib-2025-049 | 2025-05-07T17:06:36.000Z | 2025-05-29T18:20:00.000Z | |
| drupal-contrib-2025-048 | 2025-05-07T17:06:26.000Z | 2025-05-29T18:20:11.000Z | |
| drupal-contrib-2025-047 | 2025-05-07T17:06:16.000Z | 2025-05-07T17:06:16.000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-000109 | Multiple vulnerabilities in SNC-CX600W | 2025-11-25T14:59+09:00 | 2025-11-25T14:59+09:00 |
| jvndb-2025-000108 | "FOD" App uses hard-coded cryptographic keys | 2025-11-25T14:15+09:00 | 2025-11-25T14:15+09:00 |
| jvndb-2025-000106 | Multiple vulnerabilities in LogStare Collector | 2025-11-21T16:27+09:00 | 2025-11-21T16:27+09:00 |
| jvndb-2025-019621 | EPSON WebConfig / Epson Web Control for SEIKO EPSON Projector Products do not restrict excessive authentication attempts | 2025-11-21T15:31+09:00 | 2025-12-24T10:54+09:00 |
| jvndb-2025-000107 | Installer of RakurakuMusen Start EX for Windows may insecurely load Dynamic Link Libraries | 2025-11-19T16:22+09:00 | 2025-11-19T16:22+09:00 |
| jvndb-2025-000097 | "Dejira" App for iOS vulnerable to improper server certificate verification | 2025-11-17T14:09+09:00 | 2025-11-17T14:09+09:00 |
| jvndb-2025-000105 | NCP-HG100 vulnerable to OS command injection | 2025-11-14T15:26+09:00 | 2025-11-14T15:26+09:00 |
| jvndb-2025-000104 | Multiple vulnerabilities in GNU Libmicrohttpd | 2025-11-10T15:07+09:00 | 2025-11-10T15:07+09:00 |
| jvndb-2025-000103 | Use of password hash with insufficient computational effort vulnerability in BUFFALO Wi-Fi router "WSR-1800AX4 series" | 2025-11-07T15:39+09:00 | 2025-11-07T15:39+09:00 |
| jvndb-2025-000102 | CLUSTERPRO X and EXPRESSCLUSTER X vulnerable to OS command injection | 2025-11-07T14:55+09:00 | 2025-11-07T14:55+09:00 |
| jvndb-2025-000101 | GROWI vulnerable to stored cross-site scripting | 2025-11-06T13:45+09:00 | 2025-11-06T13:45+09:00 |
| jvndb-2025-017972 | Multiple vulnerabilities in Century Systems FutureNet MA and IP-K series | 2025-11-04T16:37+09:00 | 2025-11-04T16:37+09:00 |
| jvndb-2025-000100 | Multiple Roboticsware products register Windows services with unquoted file paths | 2025-11-04T14:17+09:00 | 2025-11-04T14:17+09:00 |
| jvndb-2025-000098 | Optical Disc Archive Software (for Windows) registers a Windows service with an unquoted file path | 2025-11-04T13:51+09:00 | 2025-11-04T13:51+09:00 |
| jvndb-2025-000099 | Progress Flowmon vulnerable to authenticated OS command injection | 2025-11-04T12:47+09:00 | 2025-11-04T12:47+09:00 |
| jvndb-2025-000096 | Installer of WTW EAGLE (for Windows) may insecurely load Dynamic Link Libraries | 2025-10-29T14:17+09:00 | 2025-10-29T14:17+09:00 |
| jvndb-2025-000095 | MZK-DP300N uses hard-coded credentials | 2025-10-28T14:04+09:00 | 2025-10-28T14:04+09:00 |
| jvndb-2025-000093 | Multiple stored cross-site scripting vulnerabilities in Pleasanter | 2025-10-24T15:11+09:00 | 2025-10-24T15:11+09:00 |
| jvndb-2025-000084 | GROWI vulnerable to cross-site scripting | 2025-10-22T15:44+09:00 | 2025-10-22T15:44+09:00 |
| jvndb-2025-000091 | Multiple I-O DATA NAS management applications register Windows services with unquoted file paths | 2025-10-22T15:04+09:00 | 2025-12-10T16:20+09:00 |
| jvndb-2025-000090 | Multiple stored cross-site scripting vulnerabilities in Movable Type | 2025-10-22T13:54+09:00 | 2025-10-22T13:54+09:00 |
| jvndb-2025-000088 | Lanscope Endpoint Manager (On-Premises) vulnerable to improper verification of source of a communication channel | 2025-10-20T16:17+09:00 | 2025-10-22T10:06+09:00 |
| jvndb-2025-000092 | ETERNUS SF vulnerable to incorrect default permissions | 2025-10-20T14:20+09:00 | 2025-10-20T14:20+09:00 |
| jvndb-2025-000089 | Installer of AutoDownloader may insecurely load Dynamic Link Libraries | 2025-10-17T13:38+09:00 | 2025-10-17T13:38+09:00 |
| jvndb-2025-000074 | Multiple vulnerabilities in desknet's NEO | 2025-10-16T17:30+09:00 | 2025-10-16T17:30+09:00 |
| jvndb-2025-000076 | Multiple vulnerabilities in ChatLuck | 2025-10-16T17:17+09:00 | 2025-10-16T17:17+09:00 |
| jvndb-2025-000087 | Ruijie Networks RG-EST300 undocumented SSH functionality | 2025-10-16T14:19+09:00 | 2025-10-16T14:19+09:00 |
| jvndb-2025-016124 | Buffalo Wi-Fi router WXR9300BE6P series vulnerable to path traversal | 2025-10-16T11:16+09:00 | 2025-10-16T11:16+09:00 |
| jvndb-2025-000085 | Multiple RSUPPORT products may insecurely load Dynamic Link Libraries | 2025-10-15T15:55+09:00 | 2025-10-15T15:55+09:00 |
| jvndb-2025-000086 | Phoenix Contact CHARX SEC-3xxx vulnerable to code injection | 2025-10-15T15:54+09:00 | 2025-10-15T15:54+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-09621 | MedDream PACS Premium config.php功能worklistsrc参数跨站脚本漏洞 | 2026-01-30 | 2026-02-03 |
| cnvd-2026-09620 | MedDream PACS Premium config.php功能uploaddir参数跨站脚本漏洞 | 2026-01-30 | 2026-02-03 |
| cnvd-2026-09619 | MedDream PACS Premium config.php功能thumbnaildir参数跨站脚本漏洞 | 2026-01-30 | 2026-02-03 |
| cnvd-2026-09618 | MedDream PACS Premium config.php功能status参数跨站脚本漏洞 | 2026-01-30 | 2026-02-03 |
| cnvd-2026-09617 | MedDream PACS Premium config.php功能phpexe参数跨站脚本漏洞 | 2026-01-30 | 2026-02-03 |
| cnvd-2026-09616 | MedDream PACS Premium config.php功能phpdir参数跨站脚本漏洞 | 2026-01-30 | 2026-02-03 |
| cnvd-2026-09615 | MedDream PACS Premium config.php功能longtermdir参数跨站脚本漏洞 | 2026-01-30 | 2026-02-03 |
| cnvd-2026-09614 | MedDream PACS Premium config.php功能imagedir参数跨站脚本漏洞 | 2026-01-30 | 2026-02-03 |
| cnvd-2026-09461 | WordPress插件AWP Classifieds信息泄露漏洞 | 2026-01-30 | 2026-02-02 |
| cnvd-2026-10667 | MedDream PACS Premium跨站脚本漏洞(CNVD-2026-10667) | 2026-01-29 | 2026-02-11 |
| cnvd-2026-09794 | Apache bRPC远程命令注入漏洞 | 2026-01-29 | 2026-01-30 |
| cnvd-2026-10670 | MedDream PACS Premium跨站脚本漏洞(CNVD-2026-10670) | 2026-01-26 | 2026-02-11 |
| cnvd-2026-10669 | MedDream PACS Premium跨站脚本漏洞(CNVD-2026-10669) | 2026-01-26 | 2026-02-11 |
| cnvd-2026-10668 | MedDream PACS Premium跨站脚本漏洞(CNVD-2026-10668) | 2026-01-26 | 2026-02-11 |
| cnvd-2026-10660 | IBM ApplinX数据伪造问题漏洞 | 2026-01-26 | 2026-02-10 |
| cnvd-2026-08328 | Tenda AX1806堆栈溢出漏洞(CNVD-2026-08328) | 2026-01-26 | 2026-01-29 |
| cnvd-2026-08327 | Tenda AX1803堆栈溢出漏洞 | 2026-01-26 | 2026-01-29 |
| cnvd-2026-08326 | Tenda AX1806堆栈溢出漏洞 | 2026-01-26 | 2026-01-29 |
| cnvd-2026-07240 | Google Chrome实现不当漏洞(CNVD-2026-07240) | 2026-01-23 | 2026-01-26 |
| cnvd-2026-05940 | GNU InetUtils Telnetd远程认证绕过漏洞 | 2026-01-22 | 2026-01-22 |
| cnvd-2026-10875 | Huawei HarmonyOS卡框架模块多线程竞争条件漏洞 | 2026-01-19 | 2026-02-13 |
| cnvd-2026-10874 | Huawei HarmonyOS和EMUI克隆模块中间人攻击漏洞 | 2026-01-19 | 2026-02-13 |
| cnvd-2026-10873 | Huawei HarmonyOS和EMUI媒体库模块权限验证绕过漏洞(CNVD-2026-10873) | 2026-01-19 | 2026-02-13 |
| cnvd-2026-10872 | Huawei HarmonyOS和EMUI媒体库模块权限验证绕过漏洞 | 2026-01-19 | 2026-02-13 |
| cnvd-2026-10859 | Adobe Substance 3D Modeler越界写入漏洞(CNVD-2026-10859) | 2026-01-19 | 2026-02-12 |
| cnvd-2026-10858 | Adobe Substance 3D Modeler越界写入漏洞(CNVD-2026-10858) | 2026-01-19 | 2026-02-12 |
| cnvd-2026-10682 | Microsoft Windows SMB Server拒绝服务漏洞 | 2026-01-19 | 2026-02-12 |
| cnvd-2026-10681 | Microsoft Windows SMB Server权限提升漏洞(CNVD-2026-10681) | 2026-01-19 | 2026-02-12 |
| cnvd-2026-10680 | Microsoft Windows SMB Server权限提升漏洞(CNVD-2026-10680) | 2026-01-19 | 2026-02-12 |
| cnvd-2026-10679 | Microsoft Windows SMB Server权限提升漏洞(CNVD-2026-10679) | 2026-01-19 | 2026-02-12 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2026-01783 | Уязвимость почтового клиента Microsoft Outlook, пакетов программ Microsoft Office, Excel … | 13.02.2026 | 13.02.2026 |
| bdu:2026-01782 | Уязвимость пакетов программ Microsoft Office, Excel и 365 Apps for Enterprise, связанная … | 13.02.2026 | 13.02.2026 |
| bdu:2026-01781 | Уязвимость пакетов программ Microsoft Office, Excel и 365 Apps for Enterprise, связанная … | 13.02.2026 | 13.02.2026 |
| bdu:2026-01780 | Уязвимость компонента Graphics операционных систем Windows, позволяющая нарушителю повыси… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01779 | Уязвимость подсистемы совместимости для запуска Linux-приложений Windows Subsystem for Li… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01778 | Уязвимость драйвера Windows Ancillary Function Driver for WinSock операционных систем Win… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01777 | Уязвимость компонента Graphics операционных систем Windows, позволяющая нарушителю повыси… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01776 | Уязвимость сервера отчетов Power BI Report Server, связанная с недостаточной проверкой вв… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01775 | Уязвимость программной платформы .NET, связанная с некорректной обработкой отсутствующего… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01774 | Уязвимость функции png_set_quantize() библиотеки для работы с растровой графикой в формат… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01773 | Уязвимость системы автоматизации технологических процессов EcoStruxure Process Expert и E… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01772 | Уязвимость программного обеспечения Gridscale X Prepay, связанная с несоответствием ответ… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01771 | Уязвимость сетевого программного обеспечения Siemens, связанная с неконтролируемым элемен… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01770 | Уязвимость программного обеспечения контроля лицензий CodeMeter, связанная с недостатками… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01769 | Уязвимость системного демона chassisd операционной системы Juniper Networks Junos маршрут… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01768 | Уязвимость веб-интерфейса управления системы обработки вызовов Cisco Unified Communicatio… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01767 | Уязвимость веб-интерфейса управления системы мониторинга и управления сетевым оборудовани… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01766 | Уязвимость микропрограммного обеспечения Cisco SIP IP-телефонов Cisco Video Phone 8875, D… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01765 | Уязвимость микропрограммного обеспечения Cisco SIP IP-телефонов Cisco Video Phone 8875, D… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01764 | Уязвимость веб-интерфейса средства унифицированного управления Cisco Unified Computing Sy… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01763 | Уязвимость программных продуктов Cisco Unified Contact Center Enterprise и Cisco Packaged… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01762 | Уязвимость SSH службы технологии Cisco Ultra-Reliable Wireless Backhaul (URWB) сетевых ус… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01761 | Уязвимость оболочки обслуживания программного средства управления облачными системами Cis… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01760 | Уязвимость программных продуктов Cisco Unified Contact Center Enterprise и Cisco Packaged… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01759 | Уязвимость веб-интерфейса управления системы мониторинга и управления сетевым оборудовани… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01758 | Уязвимость веб-интерфейса платформы управления политиками соединений Cisco Identity Servi… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01757 | Уязвимость веб-интерфейса платформы управления политиками соединений Cisco Identity Servi… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01756 | Уязвимость механизма обнаружения Snort программного межсетевого экрана Cisco Secure Firew… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01755 | Уязвимость механизма обнаружения Snort программного межсетевого экрана Cisco Secure Firew… | 13.02.2026 | 13.02.2026 |
| bdu:2026-01754 | Уязвимость ядра подсистемы совместимости для запуска Linux-приложений Windows Subsystem f… | 13.02.2026 | 13.02.2026 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0143 | Multiples vulnérabilités dans Synology Storage Manager | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0142 | Multiples vulnérabilités dans MongoDB | 2026-02-11T00:00:00.000000 | 2026-02-11T00:00:00.000000 |
| certfr-2026-avi-0141 | Multiples vulnérabilités dans les produits SAP | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| certfr-2026-avi-0140 | Multiples vulnérabilités dans les produits Axis | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| certfr-2026-avi-0139 | Multiples vulnérabilités dans les produits Siemens | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| certfr-2026-avi-0138 | Multiples vulnérabilités dans les produits Schneider Electric | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| certfr-2026-avi-0137 | Multiples vulnérabilités dans GnuTLS | 2026-02-10T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| certfr-2026-avi-0136 | Vulnérabilité dans Fortinet FortiClientEMS | 2026-02-09T00:00:00.000000 | 2026-02-09T00:00:00.000000 |
| certfr-2026-avi-0135 | Vulnérabilité dans GitLab AI Gateway | 2026-02-09T00:00:00.000000 | 2026-02-09T00:00:00.000000 |
| certfr-2026-avi-0134 | Vulnérabilité dans Microsoft Edge | 2026-02-09T00:00:00.000000 | 2026-02-09T00:00:00.000000 |
| certfr-2026-avi-0133 | Multiples vulnérabilités dans Roundcube | 2026-02-09T00:00:00.000000 | 2026-02-10T00:00:00.000000 |
| certfr-2026-avi-0132 | Multiples vulnérabilités dans VMware Tanzu Greenplum | 2026-02-09T00:00:00.000000 | 2026-02-09T00:00:00.000000 |
| certfr-2026-avi-0131 | Multiples vulnérabilités dans les produits IBM | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0130 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0129 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0128 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0127 | Vulnérabilité dans NetApp ONTAP 9 | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0126 | Vulnérabilité dans ESET Management Agent | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0125 | Multiples vulnérabilités dans les produits Moxa | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0124 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0123 | Multiples vulnérabilités dans Asterisk | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0122 | Multiples vulnérabilités dans Tenable Nessus | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0121 | Vulnérabilité dans les produits Juniper Networks | 2026-02-06T00:00:00.000000 | 2026-02-06T00:00:00.000000 |
| certfr-2026-avi-0120 | Multiples vulnérabilités dans les produits F5 | 2026-02-05T00:00:00.000000 | 2026-02-05T00:00:00.000000 |
| certfr-2026-avi-0119 | Multiples vulnérabilités dans les produits Cisco | 2026-02-05T00:00:00.000000 | 2026-02-05T00:00:00.000000 |
| certfr-2026-avi-0118 | Multiples vulnérabilités dans les produits Splunk | 2026-02-05T00:00:00.000000 | 2026-02-05T00:00:00.000000 |
| certfr-2026-avi-0117 | Multiples vulnérabilités dans GLPI | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| certfr-2026-avi-0116 | Vulnérabilité dans les produits Moxa | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| certfr-2026-avi-0115 | Multiples vulnérabilités dans Tenable Identity Exposure | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| certfr-2026-avi-0114 | Multiples vulnérabilités dans Google Chrome | 2026-02-04T00:00:00.000000 | 2026-02-04T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2021-ale-020 | [Maj] Multiples vulnérabilités dans Microsoft Azure Open Management Infrastructure | 2021-09-17T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| certfr-2021-ale-019 | [MaJ] Vulnérabilité dans Microsoft Windows | 2021-09-08T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2021-ale-018 | Vulnérabilité dans Atlassian Confluence Server et Data Center | 2021-09-06T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| certfr-2021-ale-017 | Multiples vulnérabilités dans Microsoft Exchange | 2021-08-27T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2021-ale-016 | Vulnérabilité dans SonicWall | 2021-07-15T00:00:00.000000 | 2021-08-19T00:00:00.000000 |
| certfr-2021-ale-015 | Multiples vulnérabilités dans SolarWinds Serv-U | 2021-07-13T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| certfr-2021-ale-014 | [MaJ] Multiples vulnérabilités dans Microsoft Windows | 2021-07-02T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| certfr-2021-ale-013 | [MaJ] Vulnérabilité dans Microsoft Windows | 2021-06-30T00:00:00.000000 | 2021-07-02T00:00:00.000000 |
| certfr-2021-ale-012 | Multiples vulnérabilités dans Microsoft Windows | 2021-06-09T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| certfr-2021-ale-011 | Vulnérabilité dans VMware vCenter Server | 2021-06-07T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| certfr-2021-ale-010 | Vulnérabilité dans Adobe Acrobat et Acrobat Reader | 2021-05-12T00:00:00.000000 | 2021-06-29T00:00:00.000000 |
| certfr-2021-ale-009 | [MàJ] Vulnérabilité dans Microsoft Windows | 2021-05-12T00:00:00.000000 | 2021-06-10T00:00:00.000000 |
| certfr-2021-ale-008 | Multiples vulnérabilités dans Exim | 2021-05-05T00:00:00.000000 | 2021-06-10T00:00:00.000000 |
| certfr-2021-ale-007 | [MàJ] Vulnérabilité dans Pulse Connect Secure | 2021-04-20T00:00:00.000000 | 2021-06-21T00:00:00.000000 |
| certfr-2021-ale-006 | [MàJ] Vulnérabilité dans F5 BIG-IP | 2021-03-22T00:00:00.000000 | 2021-04-15T00:00:00.000000 |
| certfr-2021-ale-005 | Multiples vulnérabilités dans Microsoft DNS server | 2021-03-12T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| certfr-2021-ale-004 | [MàJ] Multiples vulnérabilités dans Microsoft Exchange Server | 2021-03-03T00:00:00.000000 | 2021-07-16T00:00:00.000000 |
| certfr-2021-ale-003 | [MàJ] Vulnérabilité dans VMware vCenter Server | 2021-02-25T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| certfr-2021-ale-002 | [MàJ] Vulnérabilité dans Google Chrome et Microsoft Edge | 2021-02-05T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| certfr-2021-ale-001 | |MàJ] Vulnérabilité dans SonicWall SMA100 | 2021-02-02T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| certfr-2020-ale-026 | [MaJ] Présence de code malveillant dans SolarWinds Orion | 2020-12-14T00:00:00.000000 | 2021-04-15T00:00:00.000000 |
| certfr-2020-ale-025 | Vulnérabilité dans Fortinet FortiOS SSL-VPN | 2020-11-27T00:00:00.000000 | 2021-02-08T00:00:00.000000 |
| certfr-2020-ale-024 | [MaJ] Vulnérabilité dans les produits VMware | 2020-11-24T00:00:00.000000 | 2020-12-17T00:00:00.000000 |
| certfr-2020-ale-023 | Multiples vulnérabilités dans Google Chrome | 2020-11-12T00:00:00.000000 | 2020-12-04T00:00:00.000000 |
| certfr-2020-ale-022 | [MàJ] Vulnérabilité dans Oracle Weblogic | 2020-10-30T00:00:00.000000 | 2020-12-17T00:00:00.000000 |
| certfr-2020-ale-021 | Vulnérabilité dans Samba | 2020-09-18T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| certfr-2020-ale-020 | [MàJ] Vulnérabilité dans Microsoft Netlogon | 2020-09-15T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| certfr-2020-ale-019 | Recrudescence d'activité Emotet en France | 2020-09-07T00:00:00.000000 | 2021-02-09T00:00:00.000000 |
| certfr-2020-ale-018 | Vulnérabilité dans Cisco ASA et FTD | 2020-07-28T00:00:00.000000 | 2020-11-05T00:00:00.000000 |
| certfr-2020-ale-017 | Multiples vulnérabilités dans SAP Netweaver AS JAVA | 2020-07-15T00:00:00.000000 | 2020-10-12T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2025-865 | Heap-buffer-overflow in generic_unpack | 2025-10-31T00:01:02.631036Z | 2025-11-05T14:31:24.646623Z |
| osv-2025-858 | Use-of-uninitialized-value in pcpp::byteArrayToHexString | 2025-10-26T00:13:16.483999Z | 2025-10-26T00:13:16.484559Z |
| osv-2025-857 | Global-buffer-overflow in void jxl::N_AVX2::WriteToOutputStage::StoreUnsignedRow<unsigned char> | 2025-10-25T00:05:52.218420Z | 2025-10-25T00:05:52.218807Z |
| osv-2025-855 | Use-of-uninitialized-value in AlphaReplace_SSE2 | 2025-10-24T00:16:50.919877Z | 2025-10-24T00:16:50.920218Z |
| osv-2025-852 | Heap-buffer-overflow in std::__1::pair<int, arrow::util::RleBitPackedParser::ControlFlow> arrow::util::R | 2025-10-23T00:13:16.148747Z | 2025-10-24T14:23:38.843951Z |
| osv-2025-846 | Use-of-uninitialized-value in js_create_function | 2025-10-20T00:03:40.943765Z | 2025-10-20T00:03:40.944363Z |
| osv-2025-845 | Global-buffer-overflow in icaltime_day_of_year | 2025-10-19T00:19:40.541109Z | 2025-10-19T00:19:40.541746Z |
| osv-2025-835 | Heap-use-after-free in JS_DefineProperty | 2025-10-14T00:11:08.472824Z | 2025-10-14T00:11:08.473391Z |
| osv-2025-834 | Heap-buffer-overflow in std::__1::pair<int, arrow::util::RleBitPackedParser::ControlFlow> arrow::util::R | 2025-10-14T00:10:52.861723Z | 2025-10-24T14:22:07.938287Z |
| osv-2025-827 | Global-buffer-overflow in void jxl::N_SSE4::WriteToOutputStage::StoreUnsignedRow<unsigned char> | 2025-10-10T00:09:16.816189Z | 2025-10-10T00:09:16.816846Z |
| osv-2025-825 | UNKNOWN WRITE in RescalerImportRowExpand_SSE2 | 2025-10-09T00:14:42.650822Z | 2025-10-09T00:14:42.651395Z |
| osv-2025-824 | Use-of-uninitialized-value in JS_DefineProperty | 2025-10-08T00:04:16.630040Z | 2025-10-08T00:04:16.630688Z |
| osv-2025-819 | Use-of-uninitialized-value in HasAlpha32b_SSE2 | 2025-10-07T00:04:07.544365Z | 2025-10-07T00:04:07.544831Z |
| osv-2025-818 | Heap-buffer-overflow in std::__1::pair<int, arrow::util::RleBitPackedParser::ControlFlow> arrow::util::R | 2025-10-07T00:03:45.262747Z | 2025-10-10T14:38:33.479652Z |
| osv-2025-809 | Use-of-uninitialized-value in WebPCleanupTransparentArea | 2025-10-05T00:04:29.576718Z | 2025-10-05T00:04:29.577250Z |
| osv-2025-808 | Use-of-uninitialized-value in WebPMultRow_C | 2025-10-04T00:07:11.139186Z | 2025-10-04T00:07:11.139704Z |
| osv-2025-803 | Global-buffer-overflow in icaltime_day_of_year | 2025-10-02T00:11:54.061581Z | 2025-10-02T00:11:54.061989Z |
| osv-2025-797 | Heap-buffer-overflow in ProcessRows | 2025-09-30T00:07:53.914184Z | 2025-09-30T00:07:53.914578Z |
| osv-2025-796 | Heap-buffer-overflow in AddGreenToBlueAndRed_AVX2 | 2025-09-30T00:07:08.673173Z | 2025-09-30T00:07:08.673608Z |
| osv-2025-793 | Heap-use-after-free in parse_from_header | 2025-09-29T00:08:32.876425Z | 2025-09-29T00:08:32.876798Z |
| osv-2025-788 | Heap-buffer-overflow in int arrow::bit_util::BitReader::GetBatch<int> | 2025-09-28T00:00:36.076414Z | 2025-10-10T14:35:28.235525Z |
| osv-2025-787 | Heap-buffer-overflow in DwaCompressor_uncompress | 2025-09-27T00:18:30.312049Z | 2025-09-27T00:18:30.312655Z |
| osv-2025-783 | Heap-buffer-overflow in inspect_process | 2025-09-26T00:06:21.859576Z | 2025-09-26T00:06:21.859964Z |
| osv-2025-767 | UNKNOWN READ in dcd_int_handler | 2025-09-20T00:19:20.851166Z | 2025-09-20T00:19:20.851464Z |
| osv-2025-766 | Heap-buffer-overflow in Open | 2025-09-20T00:18:10.380843Z | 2025-09-20T00:18:10.381141Z |
| osv-2025-765 | Security exception in com.spotify.docker.client.shaded.com.fasterxml.jackson.databind.util.TokenBuffer | 2025-09-20T00:18:07.994839Z | 2025-09-20T00:18:07.995257Z |
| osv-2025-764 | Global-buffer-overflow in Ogg_CreateES | 2025-09-20T00:15:54.584666Z | 2025-09-20T00:15:54.585041Z |
| osv-2025-762 | Use-of-uninitialized-value in fuzzer_send | 2025-09-19T00:14:45.258709Z | 2025-09-19T00:14:45.259063Z |
| osv-2025-742 | Null-dereference READ in ubsan_GetStackTrace | 2025-09-14T00:15:42.184140Z | 2025-09-14T00:15:42.184553Z |
| osv-2025-729 | UNKNOWN READ in sam_hrecs_free_tags | 2025-09-13T00:08:43.863495Z | 2025-09-13T00:08:43.863848Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2025-0109 | Out-of-bounds memory access in binary_read_to_ref and binary_write_from_ref | 2025-10-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0108 | Uninitialized memory exposure in string reading functions | 2025-10-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0107 | Uninitialized memory exposure in any_as_u8_slice | 2025-10-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0106 | Undefined behavior in index_of_ptr with empty slices | 2025-10-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0105 | Uninitialized memory exposure in create_ring_buffer | 2025-10-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0142 | Segmentation fault and invalid memory read in `mnl::cb_run` | 2025-10-18T12:00:00Z | 2026-02-10T13:23:41Z |
| rustsec-2025-0126 | Heap-buffer-overflow in nftnl::Batch::with_page_size (nftnl-rs) | 2025-10-18T12:00:00Z | 2025-11-27T21:53:33Z |
| rustsec-2025-0104 | `unic-ucd-segment` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0103 | `unic-ucd-core` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0102 | `unic-ucd-age` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0101 | `unic-ucd-common` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0100 | `unic-ucd-ident` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0099 | `unic-ucd-block` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0098 | `unic-ucd-version` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0097 | `unic-idna-mapping` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0096 | `unic-bidi` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0095 | `unic` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0094 | `unic-ucd-category` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0093 | `unic-char-basics` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0092 | `unic-ucd-case` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0091 | `unic-utils` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0090 | `unic-emoji-char` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0089 | `unic-ucd-name_aliases` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0088 | `unic-idna-punycode` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0087 | `unic-cli` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0086 | `unic-char` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0085 | `unic-idna` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0084 | `unic-emoji` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0083 | `unic-ucd-bidi` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| rustsec-2025-0082 | `unic-normal` is unmaintained | 2025-10-18T12:00:00Z | 2025-10-21T11:12:59Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:1852 | Moderate: util-linux security update | 2026-02-03T00:00:00Z | 2026-02-10T08:33:43Z |
| alsa-2026:1843 | Important: nodejs22 security update | 2026-02-03T00:00:00Z | 2026-02-06T17:27:45Z |
| alsa-2026:1842 | Important: nodejs24 security update | 2026-02-03T00:00:00Z | 2026-02-06T17:30:17Z |
| alsa-2026:1837 | Moderate: osbuild-composer security update | 2026-02-03T00:00:00Z | 2026-02-06T17:33:01Z |
| alsa-2026:1831 | Moderate: qemu-kvm security update | 2026-02-03T00:00:00Z | 2026-02-06T17:34:44Z |
| alsa-2026:1828 | Moderate: python3.12 security update | 2026-02-03T00:00:00Z | 2026-02-05T09:48:47Z |
| alsa-2026:1825 | Moderate: curl security update | 2026-02-03T00:00:00Z | 2026-02-05T09:50:43Z |
| alsa-2026:1715 | Important: golang-github-openprinting-ipp-usb security update | 2026-02-02T00:00:00Z | 2026-02-03T11:03:28Z |
| alsa-2026:1714 | Moderate: wireshark security update | 2026-02-02T00:00:00Z | 2026-02-03T11:02:21Z |
| alsa-2026:1696 | Moderate: util-linux security update | 2026-02-02T00:00:00Z | 2026-02-03T11:05:12Z |
| alsa-2026:1690 | Important: kernel security update | 2026-02-02T00:00:00Z | 2026-02-05T09:56:48Z |
| alsa-2026:1662 | Moderate: kernel security update | 2026-02-02T00:00:00Z | 2026-02-02T13:45:57Z |
| alsa-2026:1661 | Moderate: kernel-rt security update | 2026-02-02T00:00:00Z | 2026-02-02T13:40:07Z |
| alsa-2026:1631 | Moderate: python3 security update | 2026-02-02T00:00:00Z | 2026-02-02T12:08:18Z |
| alsa-2026:1628 | Important: php security update | 2026-02-02T00:00:00Z | 2026-02-02T09:59:40Z |
| alsa-2026:1617 | Moderate: kernel security update | 2026-02-02T00:00:00Z | 2026-02-06T08:24:53Z |
| alsa-2026:1597 | Moderate: iperf3 security update | 2026-01-29T00:00:00Z | 2026-02-02T10:00:47Z |
| alsa-2026:1595 | Moderate: iperf3 security update | 2026-01-29T00:00:00Z | 2026-02-02T10:01:50Z |
| alsa-2026:1592 | Moderate: iperf3 security update | 2026-01-29T00:00:00Z | 2026-02-02T11:56:57Z |
| alsa-2026:1574 | Important: gimp:2.8 security update | 2026-01-29T00:00:00Z | 2026-01-29T14:07:36Z |
| alsa-2026:1518 | Important: grafana-pcp security update | 2026-01-28T00:00:00Z | 2026-01-29T12:32:40Z |
| alsa-2026:1478 | Moderate: python3.9 security update | 2026-01-28T00:00:00Z | 2026-01-28T19:56:37Z |
| alsa-2026:1473 | Important: openssl security update | 2026-01-28T00:00:00Z | 2026-02-02T11:12:21Z |
| alsa-2026:1472 | Important: openssl security update | 2026-01-28T00:00:00Z | 2026-01-28T19:58:47Z |
| alsa-2026:1429 | Important: php:8.3 security update | 2026-01-27T00:00:00Z | 2026-01-29T11:59:57Z |
| alsa-2026:1412 | Important: php:8.2 security update | 2026-01-27T00:00:00Z | 2026-02-02T11:16:18Z |
| alsa-2026:1410 | Moderate: python3.11 security update | 2026-01-27T00:00:00Z | 2026-01-29T12:02:18Z |
| alsa-2026:1409 | Important: php:8.2 security update | 2026-01-27T00:00:00Z | 2026-02-02T11:20:21Z |
| alsa-2026:1408 | Moderate: python3.12 security update | 2026-01-27T00:00:00Z | 2026-01-29T12:05:44Z |
| alsa-2026:1381 | Moderate: osbuild-composer security update | 2026-01-27T00:00:00Z | 2026-02-02T11:22:03Z |